Skip to main content

The Purpose of PKI

  • Chapter
  • First Online:
Introduction to Public Key Infrastructures

Abstract

Public key cryptography helps make information and communication technology (ICT) systems more secure. Public key infrastructures (PKIs) enable the use of public key cryptography in open computer networks, in particular on the Internet. In this chapter, we use characteristic examples of Internet applications to illustrate potential threats against ICT and describe important security goals that can be achieved using public key cryptography and PKI. We discuss the basics of public key cryptography and explain how this technology supports the security goals explained in this chapter. Finally, we present the challenges that lead to the need for PKI. For more details on public key cryptography see [4].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Appenzeller, L. Martin, M. Schertler, Identity-based encryption architecture and supporting data structures, in IETF Request for Comments, 5408, Jan 2009

    Google Scholar 

  2. D.J. Bernstein, J. Buchmann, E. Dahmen (ed.), Post Quantum Cryptography (Springer, Berlin, 2008)

    Google Scholar 

  3. X. Boyen, L. Martin, Identity-based cryptography standard (IBCS) #1: supersingular curve implementations of the BF and BB1 cryptosystems, in IETF Request for Comments, 5091, Dec 2007

    Google Scholar 

  4. J.A. Buchmann, Introduction to Cryptography, 2nd edn. (Springer, New York, 2004)

    Book  Google Scholar 

  5. Common Criteria, Common criteria for information technology security evaluation—part 3: security assurance components—version 3.1 (2007), http://www.commoncriteriaportal.org/thecc.html

  6. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

    Google Scholar 

  7. M. Gardner, Mathematical games: a new kind of cipher that would take millions of years to break. Sci. Am. 237(2), 120–124 (1977)

    Article  Google Scholar 

  8. Internet Usage, http://www.internetworldstats.com/stats.htm

  9. D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    Google Scholar 

  10. L. Martin, M. Schertler, Using the Boneh-Franklin and Boneh-Boyen identity-based encryption algorithms with the cryptographic message syntax (CMS), in IETF Request for Comments, 5409, Jan 2009

    Google Scholar 

  11. National Bureau of Standards, Data Encryption Standard, FIPS PUB 46, Jan 1977

    Google Scholar 

  12. National Institute of Standards and Technology (NIST), FIPS PUB 46-3 – Data Encryption Standard (DES) (1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  13. National Institute of Standards and Technology (NIST), FIPS PUB 186-2 – Digital Signature Standard (DSS) (2000), http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf

  14. National Institute of Standards and Technology (NIST), FIPS PUB 197 – specification for the Advanced Encryption Standard (AES) (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  15. Privacy Breach, http://www.nytimes.com/2007/11/22/world/europe/22data.html

  16. R.L. Rivest, M.J.B. Robshaw, R.Sidney, Y.L. Yin, The RC6 block cipher (1998), ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf

  17. RSA Laboratories, PKCS #1 v2.1: RSA cryptography standard (2002), http://www.rsa.com/rsalabs/node.asp?id=2125

  18. Serpent – A Candidate Block Cipher for the Advanced Encryption Standard, http://www.cl.cam.ac.uk/~rja14/serpent.html

  19. P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, in Proceedings of the 35th IEEE Annual Symposium on Foundations of Computer Science, Santa Fe, Nov 1994, pp. 124–134

    Google Scholar 

  20. The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 (1998), http://csrc.nist.gov/drivers/documents/paper598.pdf

  21. The Legion of the Bouncy Castle, http://www.bouncycastle.org/

  22. Twofish, http://www.schneier.com/twofish.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). The Purpose of PKI. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics